vendor:
A850R-V1, F1-V2, F2-V1, N150RT-V2, N151RT-V2, N300RH-V2, N300RH-V3, N300RT-V2
by:
MadMouse
7.5
CVSS
HIGH
Backdoor and RCE
284
CWE
Product Name: A850R-V1, F1-V2, F2-V1, N150RT-V2, N151RT-V2, N300RH-V2, N300RH-V3, N300RT-V2
Affected Version From: A850R-V1, F1-V2, F2-V1, N150RT-V2, N151RT-V2, N300RH-V2, N300RH-V3, N300RT-V2
Affected Version To: Latest firmware
Patch Exists: YES
Related CWE: N/A
CPE: h:totolink:a850r-v1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: A850R-V1
2015
TOTOLINK backdoor and RCE exploit POC
This exploit allows an attacker to gain access to the management interface of TOTOLINK routers and execute arbitrary commands on the device. The exploit works on A850R-V1, F1-V2, F2-V1, N150RT-V2, N151RT-V2, N300RH-V2, N300RH-V3, N300RT-V2 until the last firmware. The exploit is triggered by sending a specific string to the router on port 5555.
Mitigation:
Disable remote access to the router and ensure that the router is running the latest firmware.